The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Brian King: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Yvo Desmedt, Brian King, Wataru Kishimoto, Kaoru Kurosawa
    A Comment on the Efficiency of Secret Sharing Scheme over Any Finite Abelian Group. [Citation Graph (0, 0)][DBLP]
    ACISP, 1998, pp:391-402 [Conf]
  2. Brian King
    Algorithms to Speed Up Computations in Threshold RSA. [Citation Graph (0, 0)][DBLP]
    ACISP, 2000, pp:443-456 [Conf]
  3. Brian King
    Randomness Required for Linear Threshold Sharing Schemes Defined over Any Finite Abelian Group. [Citation Graph (0, 0)][DBLP]
    ACISP, 2001, pp:376-391 [Conf]
  4. Brian King
    Requirements for Group Independent Linear Threshold Secret Sharing Schemes. [Citation Graph (0, 0)][DBLP]
    ACISP, 2002, pp:89-106 [Conf]
  5. Brian King
    An Efficient Implementation of a Threshold RSA Signature Scheme. [Citation Graph (0, 0)][DBLP]
    ACISP, 2005, pp:382-393 [Conf]
  6. Brian King, Ben Rubin
    Improvements to the Point Halving Algorithm. [Citation Graph (0, 0)][DBLP]
    ACISP, 2004, pp:262-276 [Conf]
  7. Brian King
    Improved Methods to Perform Threshold RSA. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2000, pp:359-372 [Conf]
  8. Xiaolan Zhang 0003, Brian King
    Modeling RFID Security. [Citation Graph (0, 0)][DBLP]
    CISC, 2005, pp:75-90 [Conf]
  9. Yvo Desmedt, Brian King
    Verifiable Democracy. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 1999, pp:53-70 [Conf]
  10. Elias Haddad, Brian King
    Anonymous Simple Secure M-Commerce Protocol. [Citation Graph (0, 0)][DBLP]
    PSC, 2005, pp:199-205 [Conf]
  11. Sining Liu, Brian King, Wei Wang
    A CRT-RSA Algorithm Secure against Hardware Fault Attacks. [Citation Graph (0, 0)][DBLP]
    DASC, 2006, pp:51-60 [Conf]
  12. Yvo Desmedt, Brian King
    Verifiable Democracy a Protocol to Secure an Electronic Legislature. [Citation Graph (0, 0)][DBLP]
    EGOV, 2002, pp:460-463 [Conf]
  13. Brian King, Yvo Desmedt
    Securing Abstention in an Electronic Legislature. [Citation Graph (0, 0)][DBLP]
    HICSS, 2005, pp:- [Conf]
  14. Xiaolan Zhang 0003, Brian King
    Integrity Improvements to an RFID Privacy Protection Protocol for Anti-counterfeiting. [Citation Graph (0, 0)][DBLP]
    ISC, 2005, pp:474-481 [Conf]
  15. Brian King
    A Point Compression Method for Elliptic Curves Defined over GF(2 n). [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2004, pp:333-345 [Conf]
  16. Brian King
    An Improved Implementation of Elliptic Curves over GF(2) when Using Projective Point Arithmetic. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2001, pp:134-150 [Conf]
  17. Paul Salama, Brian King
    Efficient secure image transmission: compression integrated with encryption. [Citation Graph (0, 0)][DBLP]
    Security, Steganography, and Watermarking of Multimedia Contents, 2005, pp:47-58 [Conf]
  18. Brian King
    A Comment on Group Independent Threshold Sharing. [Citation Graph (0, 0)][DBLP]
    WISA, 2003, pp:425-441 [Conf]
  19. Brian King, Xiaolan Zhang 0003
    Securing the Pharmaceutical Supply Chain using RFID. [Citation Graph (0, 0)][DBLP]
    MUE, 2007, pp:23-28 [Conf]
  20. Sining Liu, F. Bowen, Brian King, Wei Wang
    Elliptic curves cryptosystem implementation based on a look-up table sharing scheme. [Citation Graph (0, 0)][DBLP]
    ISCAS, 2006, pp:- [Conf]
  21. Xiaolan Zhang 0003, Brian King
    An Anti-Counterfeiting RFID Privacy Protection Protocol. [Citation Graph (0, 0)][DBLP]
    J. Comput. Sci. Technol., 2007, v:22, n:3, pp:438-448 [Journal]

  22. wNAF*, an Efficient Left-to-Right Signed Digit Recoding Algorithm. [Citation Graph (, )][DBLP]


  23. Revisiting the Karnin, Greene and Hellman Bounds. [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.003secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002